City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.14.168.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.14.168.62. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 183 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:20:29 CST 2025
;; MSG SIZE rcvd: 106
Host 62.168.14.134.in-addr.arpa not found: 2(SERVFAIL)
server can't find 134.14.168.62.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.130.63 | attack | Bruteforce detected by fail2ban |
2020-06-15 17:13:43 |
| 140.143.57.203 | attack | Jun 15 09:00:03 vmi345603 sshd[12819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.203 Jun 15 09:00:06 vmi345603 sshd[12819]: Failed password for invalid user frank from 140.143.57.203 port 59622 ssh2 ... |
2020-06-15 17:04:31 |
| 183.16.102.44 | attackspambots | Tried our host z. |
2020-06-15 17:01:18 |
| 49.88.112.111 | attack | $f2bV_matches |
2020-06-15 17:23:11 |
| 106.13.59.224 | attackspam | k+ssh-bruteforce |
2020-06-15 17:16:25 |
| 103.131.71.134 | attack | (mod_security) mod_security (id:210730) triggered by 103.131.71.134 (VN/Vietnam/bot-103-131-71-134.coccoc.com): 5 in the last 3600 secs |
2020-06-15 17:34:43 |
| 162.243.136.28 | attackbotsspam | Unauthorized connection attempt detected from IP address 162.243.136.28 to port 8005 [T] |
2020-06-15 17:05:31 |
| 95.111.74.98 | attackspambots | Jun 15 05:53:40 ns382633 sshd\[26096\]: Invalid user nano from 95.111.74.98 port 58938 Jun 15 05:53:40 ns382633 sshd\[26096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98 Jun 15 05:53:42 ns382633 sshd\[26096\]: Failed password for invalid user nano from 95.111.74.98 port 58938 ssh2 Jun 15 05:57:28 ns382633 sshd\[26815\]: Invalid user admin from 95.111.74.98 port 58988 Jun 15 05:57:28 ns382633 sshd\[26815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.111.74.98 |
2020-06-15 17:01:35 |
| 46.166.129.156 | attackbots | Fail2Ban Ban Triggered (2) |
2020-06-15 17:16:52 |
| 182.253.119.50 | attackspambots | Invalid user tcadmin from 182.253.119.50 port 46100 |
2020-06-15 17:30:52 |
| 120.253.11.135 | attack | Jun 15 10:46:22 gw1 sshd[20640]: Failed password for root from 120.253.11.135 port 35342 ssh2 ... |
2020-06-15 17:06:30 |
| 118.25.99.44 | attack | SSH Bruteforce attack |
2020-06-15 16:55:50 |
| 113.125.159.5 | attackspam | 2020-06-15T05:55:23.278505shield sshd\[25616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.159.5 user=root 2020-06-15T05:55:25.588595shield sshd\[25616\]: Failed password for root from 113.125.159.5 port 53290 ssh2 2020-06-15T06:04:21.543030shield sshd\[27294\]: Invalid user wad from 113.125.159.5 port 36461 2020-06-15T06:04:21.546512shield sshd\[27294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.159.5 2020-06-15T06:04:23.379935shield sshd\[27294\]: Failed password for invalid user wad from 113.125.159.5 port 36461 ssh2 |
2020-06-15 16:56:03 |
| 163.172.61.214 | attackbotsspam | 2020-06-14T23:57:26.301969linuxbox-skyline sshd[397976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.61.214 user=root 2020-06-14T23:57:28.497825linuxbox-skyline sshd[397976]: Failed password for root from 163.172.61.214 port 54396 ssh2 ... |
2020-06-15 17:20:45 |
| 151.80.140.166 | attack | $f2bV_matches |
2020-06-15 17:08:08 |